Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the SOC Analyst Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incidentresponse, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incidentresponse and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience More ❯
Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the Security Engineer Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incidentresponse, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incidentresponse and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Beneficial Experience More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
VIQU IT Recruitment
Skills & Experience from the Security Analyst: Strong experience with Microsoft Sentinel (SIEM) and Microsoft Defender suite (Defender for Endpoint, Identity, Cloud, etc.). Proven track record in security monitoring, incidentresponse, and alert troubleshooting . Working knowledge of SOAR platforms (preferably within Sentinel or similar). Understanding of threat detection, log analysis, and automation within Microsoft’s security … alerts and incidents in Microsoft Sentinel and Microsoft Defender . Perform detailed security event analysis and correlation, escalating incidents where necessary. Develop and optimise SOAR (Security Orchestration, Automation and Response) playbooks to enhance incidentresponse and efficiency. Collaborate with wider IT and security teams to improve threat detection, incident handling, and response processes. Apply now More ❯
The Major Incident Manager will lead Critical and Major Incidents from detection through to resolution and post incident review, in addition this role will coordinate Problem Investigations and track the delivery of Problem resolution plans to reduce the likelihood of repeat Incidents. This role will provide a rapid and highly effective response when Critical or Major Incidents … occur, ensuring business impact analysis is completed, adopting the correct Incidentresponse model, and then confidently leading the communication, escalation and collaboration between cross functional teams and suppliers to restore normal service operation as quickly as possible., Summary The Major Incident Manager will lead Critical and Major Incidents from detection through to resolution and post incident … role will coordinate Problem Investigations and track the delivery of Problem resolution plans to reduce the likelihood of repeat Incidents. This role will provide a rapid and highly effective response when Critical or Major Incidents occur, ensuring business impact analysis is completed, adopting the correct Incidentresponse model, and then confidently leading the communication, escalation and collaboration More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
Days: As per business need Special Working Conditions: Occasional client site travel The Role As SOC Manager, you will: Establish goals and priorities with your team, focusing on: Improving incidentresponse times Reducing false positives and extraneous alerts Enhancing threat detection capabilities Oversee staff activities to ensure focus on the right priorities Review team performance metrics, incident reports, and other key indicators Lead incidentresponse efforts with clear procedures and protocols Analyse incident reports to understand the organization's security posture Serve as primary point of contact for security incidents, liaising with internal stakeholders and external parties Conduct information security investigations and manage end-to-end security incident resolution Report to the … identifying new use cases and automations Act as POC for SOC engineering, threat intelligence, and threat exposure management Provide guidance to Level-2 SOC security analysts during investigations and incident resolution Lead coordination of individual information security incidents Mentor security analysts on risk management, security controls, incident analysis, SIEM monitoring, and operational tasks Document incidents from detection to More ❯
This role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems … Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incidentresponse processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of Disaster Recovery (DR) and Business Continuity principles. Excellent communication skills, with … impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security IncidentResponse, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
across our three UK brands: PEXA UK, Smoove, and Optima Legal. You'll lead our Security Operations (SOC), Security Engineering, and Information Security and Governance functions, covering everything from incidentresponse and secure architecture to audits, lender assurance, and compliance with ISO 27001 and FCA requirements. This is a senior leadership role offering the opportunity to define security … SOC, engineering, and information security Represent UK security priorities in leadership forums, lender assurance discussions, and governance reviews Security Operations and Governance Oversee SOC operations ensuring timely threat detection, response, and resolution Continuously improve detection and response capabilities using Cortex XDR, Abnormal Security, Splunk, and Nucleus Manage vulnerability management end-to-end, from scanning and prioritisation to remediation … Alto Networks Splunk (SIEM and dashboarding) Abnormal Security (email security) Prisma Cloud (cloud security posture management) Airlock (application and API security) Nucleus (vulnerability management and reporting) Deep knowledge of incidentresponse, threat hunting, and vulnerability management. Excellent stakeholder management and communication skills - able to explain complex risks in simple terms. Experience building and mentoring high performing teams across More ❯
NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerability management, SIEM, logging, and alerting capabilities. IncidentResponse: Build and test incidentresponse processes, including forensic readiness and regular tabletop exercises. Compliance: Drive readiness for external certifications (ISO 27001, SOC2) and ensure ongoing … regulatory compliance (GDPR, export control, etc.). Collaboration: Partner with IT Ops Lead to embed controls into infra, IAM, and developer platforms; work with ITSM Lead to ensure security incident handling and knowledge base integration. Awareness & Culture: Develop training, awareness, and a culture of security-first thinking across Humanoid. We’re Looking For Proven experience in cyber security leadership … frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerability management, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating in a dynamic, high-growth environment with a More ❯
london (city of london), south east england, united kingdom
Humanoid
NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerability management, SIEM, logging, and alerting capabilities. IncidentResponse: Build and test incidentresponse processes, including forensic readiness and regular tabletop exercises. Compliance: Drive readiness for external certifications (ISO 27001, SOC2) and ensure ongoing … regulatory compliance (GDPR, export control, etc.). Collaboration: Partner with IT Ops Lead to embed controls into infra, IAM, and developer platforms; work with ITSM Lead to ensure security incident handling and knowledge base integration. Awareness & Culture: Develop training, awareness, and a culture of security-first thinking across Humanoid. We’re Looking For Proven experience in cyber security leadership … frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerability management, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating in a dynamic, high-growth environment with a More ❯
NIST. Risk Management: Lead risk assessments, threat modelling, and vendor security reviews; maintain the company risk register. Monitoring & Detection: Implement and oversee vulnerability management, SIEM, logging, and alerting capabilities. IncidentResponse: Build and test incidentresponse processes, including forensic readiness and regular tabletop exercises. Compliance: Drive readiness for external certifications (ISO 27001, SOC2) and ensure ongoing … regulatory compliance (GDPR, export control, etc.). Collaboration: Partner with IT Ops Lead to embed controls into infra, IAM, and developer platforms; work with ITSM Lead to ensure security incident handling and knowledge base integration. Awareness & Culture: Develop training, awareness, and a culture of security-first thinking across Humanoid. We’re Looking For Proven experience in cyber security leadership … frameworks (ISO 27001, SOC2, NIST) and ability to apply them pragmatically in a start-up/scale-up. Hands-on experience with vulnerability management, SIEM/logging tools, and incident response. Demonstrated ability to lead risk assessments and implement effective mitigations. Excellent stakeholder communication skills, including board-level reporting. Comfortable operating in a dynamic, high-growth environment with a More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
variety of stakeholders to ensure, the Leidos CSOC, a Defensive Cyber Security capability, can support a customers Cyber Resilience, protecting them with a 24 x 7 Threat Detection and Response service, mitigating their risk of Cyber Attack. The successful candidate will be able to demonstrate experience from a CSOC background or be able to demonstrate sufficient transferable Cyber Security … reactive analysis, articulating emerging trends to leadership and staff. Use data collected from Cyber Defence tools firewalls, IDS, network traffic, UEBA (User Entity Behaviour Analysis), Security Orchestration and Automated Response (SOAR) etc. to analyse events that occur within the environments. Respond to and correlate alerts from various detective and preventative Cyber Security tools such as Security Information Event Monitoring … SIEM), End Point Protection (EPP), End Point Detection and Response (EDR), XDR (Extended DR), Web Application Firewall (WAF), and Firewalls. Proactively detect suspicious activity, vulnerabilities, and security misconfigurations before they can be exploited by adversaries impacting Confidentiality, Integrity and Availability which could lead to a Cyber Security Incident. Inspection and correlation of logs from multiple sources to identify repeating More ❯
Evaluate emerging technologies (AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure, and Guidance Oversight Review, update, and enforce security policies, standards, and guidance (e.g. Acceptable Use, IncidentResponse, Remote Access). Ensure compliance with NCSC, ISO 27001, NIST, Cyber Essentials, and GDPR frameworks. Clarify security roles and responsibilities across departments. Support Information Governance and Data … awareness campaigns and training. Promote a culture of security and resilience across the organisation. Collaborate with HR and L&D to embed cyber hygiene into inductions and ongoing learning. Incident Management and Business Continuity Oversee the development and testing of IncidentResponse, Disaster Recovery, and Business Continuity Plans. Provide senior escalation and leadership during security incidents. Conduct … post-incident reviews and ensure lessons learned drive continuous improvement. Continuous Improvement and Innovation Stay informed on emerging threats and industry trends. Champion automation and innovation in security operations (e.g. SOAR, XDR). Drive security maturity assessments and roadmap development. Essential Experience Proven leadership in IT or cyber security at enterprise or local authority level. Strong understanding of security More ❯
taking a leading role in delivering technology change/improvement projects and managing external support agreements. The Cyber Security Analyst is required to focus on the detection, investigation and response to cyber security events and incidents. Other tasks involve BAU security tasks, supporting cyber security projects and assisting with regulatory compliance. Daily tasks will involve the following: * Endpoint monitoring … and analysis. * Incident readiness and handling as part of the Computer Security IncidentResponse (CSIRT) team. * Monitor and administer Security Information and Event Management (SIEM). * Malware analysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Vulnerability identification & mitigation/remediation. * Compose security alert notifications. * Advise incident … computer forensics; legal, government and jurisprudence as they relate to cybersecurity; operating systems; and methods for intelligence gathering and sharing * Knowledge of Cloud computing, computer network defence, identity management, incident management and network security. * Significant experience within a SOC environment. * Incidentresponse experience * Qualification/Certification in Cyber Security Desirable * IT Qualifications/Certifications such as CompTIA More ❯
Livingston, West Lothian, Scotland, United Kingdom Hybrid / WFH Options
QA
with suppliers on availability issues Support the HR, communications and engagement teams in any ICT set up for events, workshops and training sessions Learn the business continuity requirements and response arrangements if the ICT infrastructure were to fail or be attacked and support the incidentresponse team to resolve the incident Be the recorder/scribe … for any incidents which may require the incidentresponse team to act Shadow the IT Security Manager to learn the safeguards and monitoring systems in place Monitor and liaise with the IT Security Manager regarding any alerts via the Spycloud portal Desirable skills: Detail oriented and with a good eye on accuracy of data Friendly and helpful attitude More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
that underpin secure business operations. They will play a key role in shaping and executing the IT security strategy, acting as a subject matter expert while supporting compliance, training, incident management, and continuous improvement efforts across the organisation. Key Responsibilities: Oversees the daily operations of the IT Security team, ensuring service levels and internal objectives are consistently met. Leads … IT security projects, aligning them with broader strategic objectives and deadlines. Contributes expert guidance into IT strategy and supports its implementation from a security standpoint. Owns the organisations security incidentresponse process, including investigation, reporting, and post-incident analysis. Assesses existing system security and proposes improvements to strengthen infrastructure resilience. Ensures the secure handling, processing, and transfer … AWS). Experience with security frameworks and regulatory compliance, including ISO 27001 and GDPR. Demonstrated ability to lead, coach, and develop high-performing technical teams. Track record of managing incidentresponse and conducting technical investigations. Confident multitasker with strong project delivery and organisational skills. Experience in performing or participating in IT security audits. Excellent communication skills, both verbal More ❯
IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. IncidentResponse: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster collaboration … across global cybersecurity efforts. What You Bring Degree or equivalent experience in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incidentresponse and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
British Veterinary Association
IT projects and infrastructure. Operational Oversight: Define and deploy control baselines, templates, and standards. Tooling & Effectiveness: Manage and monitor security operations tools such as Defender, Sentinel, Tenable, and CASB. IncidentResponse: Lead triage, coordinate crisis responses, and oversee post-incident reviews. Documentation & Governance: Maintain hardening guides, architecture diagrams, and lead working groups. Cross-Regional Alignment: Foster collaboration … global cybersecurity efforts. What You Bring Essential: Degree or equivalent experience in Information Security. Certifications such as Security+, CEH, CySA+, or Cloud Security Engineer. Extensive experience in cybersecurity, especially incidentresponse and technical operations. Strong understanding of AWS and Azure cloud platforms. Familiarity with frameworks like NIST, ISO, COBIT, and OWASP. Proven success in leading and delivering security More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Essential Employment
AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incidentresponse, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security … cybersecurity awareness and training campaigns. Build a security-conscious culture across the organisation. Work with HR and Learning & Development to embed cyber hygiene into inductions and role-based training. Incident Management and Business Continuity Develop and review the Disaster Recovery and Business Continuity Plans for IT Services and support the Disaster Recovery and Business Continuity for the services areas. … Oversee and periodically test the incidentresponse and disaster recovery plans. Provide strategic direction and escalation oversight during major incidents. Conduct post-incident reviews and feed findings into policy, technical, and training improvements. Continuous Improvement and Innovation Keep abreast of emerging threats, vulnerabilities, and industry best practices. Champion innovation in security practices, tools, and automation (e.g., SOAR More ❯
AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incidentresponse, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security … cybersecurity awareness and training campaigns. Build a security-conscious culture across the organisation. Work with HR and Learning & Development to embed cyber hygiene into inductions and role-based training. Incident Management and Business Continuity Develop and review the Disaster Recovery and Business Continuity Plans for IT Services and support the Disaster Recovery and Business Continuity for the services areas … in the workplace. Oversee and periodically test the incidentresponse and disaster recovery plans. Provide strategic direction and escalation oversight during major incidents. Conduct post-incident reviews and feed findings into policy, technical, and training improvements. Continuous Improvement and Innovation Keep abreast of emerging threats, vulnerabilities, and industry best practices. Champion innovation in security practices, tools, and More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
that underpin secure business operations. They will play a key role in shaping and executing the IT security strategy, acting as a subject matter expert while supporting compliance, training, incident management, and continuous improvement efforts across the organisation. Key Responsibilities: Oversees the daily operations of the IT Security team, ensuring service levels and internal objectives are consistently met. Leads … IT security projects, aligning them with broader strategic objectives and deadlines. Contributes expert guidance into IT strategy and supports its implementation from a security standpoint. Owns the organisations security incidentresponse process, including investigation, reporting, and post-incident analysis. Assesses existing system security and proposes improvements to strengthen infrastructure resilience. Ensures the secure handling, processing, and transfer … AWS). Experience with security frameworks and regulatory compliance, including ISO 27001 and GDPR. Demonstrated ability to lead, coach, and develop high-performing technical teams. Track record of managing incidentresponse and conducting technical investigations. Confident multitasker with strong project delivery and organisational skills. Experience in performing or participating in IT security audits. Excellent communication skills, both verbal More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetration testing and routine vulnerability scans Monitor networks and systems for threats; lead incidentresponse efforts Perform root cause analysis and maintain incidentresponse protocols Recommend enhancements to improve overall security posture Deliver security awareness training and ensure compliance with … segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and incident handling Excellent communication and stakeholder engagement abilities Certifications such as CEH, OSCP, CISSP, Security+, or GSEC are advantageous Salary/Package Basic salary of between £50k-£55k 4% Pension More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
with Key Vault, SBOM and image scanning, policy-as-code and least privilege IAM. Drive reliability using SRE practices: define SLIs/SLOs, error budgets, capacity planning, chaos testing, incidentresponse and blameless post-incident reviews. Partner with application squads to remove toil, improve developer experience (DX), and reduce lead time for changes through automation and platform … service catalog entries; contribute to onboarding guides and demo sessions for consumers of the platform. Participate in an on-call rota for critical platform services and lead/coordinate incidentresponse when required. About you Strong hands-on experience with Microsoft Azure core services (networking, compute, storage) and platform services (AKS, App Services, API Management, Event Hub/… GitOps, and container build pipelines (e.g., ACR, OPA policies, image scanning). Working knowledge of observability tooling (Azure Monitor, Log Analytics, Application Insights, Datadog/Grafana) and alerting/response workflows. Understanding of the Microsoft Cloud Adoption Framework, Azure Landing Zones and the Well-Architected Framework. Familiarity with DevSecOps practices: threat modelling, dependency and container scanning, SBOM management, and More ❯
Employment Type: Permanent, Part Time, Work From Home
highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response) platforms. Your work will help identify and contain malicious activity, reduce false positives, and improve overall detection coverage across networks, endpoints, cloud services, and identity platforms. Job Description As … cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incidentresponse and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring and investigating security alerts to identify potential … threats Conducting proactive threat hunting using MITRE ATT&CK and threat intelligence sources Collaborating with incidentresponse teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer to SOC analysts Person Specification You will More ❯
highly secure environment. You will work within a Security Operations Centre (SOC), designing and maintaining detection logic across SIEM (Security Information and Event Management) and EDR (Endpoint Detection and Response) platforms. Your work will help identify and contain malicious activity, reduce false positives, and improve overall detection coverage across networks, endpoints, cloud services, and identity platforms. Job Description As … cyber operations team responsible for implementing and maintaining high-fidelity detection capabilities. You will contribute to the development of detection rules, threat hunting activities, and automation workflows to support incidentresponse and continuous improvement. Key responsibilities include: Designing and tuning detection rules and use cases in SIEM and EDR platforms Monitoring and investigating security alerts to identify potential … threats Conducting proactive threat hunting using MITRE ATT&CK and threat intelligence sources Collaborating with incidentresponse teams to support investigations and containment Enhancing detection coverage across network, endpoint, cloud, and identity sources Developing automation scripts and playbooks to streamline triage and response Documenting detection processes and providing knowledge transfer to SOC analysts Person Specification You will More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Robert Walters
cases Triage of security events and third-party SOC management Monitor/Collate data from endpoints across estate OSINT experience for threat hunting, prepare reports Cyber Defence Manager - Experience Incidentresponse, security engineering, intrusion detection Experience of SOC or IncidentResponse Team Analyse End Point, Network, Application Logs Security frameworks/Standards (NIST, CIS, ISO27001) Scripting More ❯